Results 51 to 60 of about 22,820 (205)

Effects of Sequential Combination of Moderate Pressure and Ultrasound on Subsequent Thermal Pasteurization of Liquid Whole Egg

open access: yesFoods, 2023
As an alternative to commercial whole egg thermal pasteurization (TP), the sequential combination of moderate pressure (MP) and/or ultrasound (US) pre-treatments prior to a shorter TP was evaluated.
Ana C. Ribeiro   +3 more
doaj   +1 more source

Segregation of receptor-ligand complexes in cell adhesion zones: Phase diagrams and role of thermal membrane roughness

open access: yes, 2010
The adhesion zone of immune cells, the 'immunological synapse', exhibits characteristic domains of receptor-ligand complexes. The domain formation is likely caused by a length difference of the receptor-ligand complexes, and has been investigated in ...
Alberts B   +9 more
core   +1 more source

LWE Public Key Cryptosystem

open access: yes, 2022
AbstractIn 2005, O.Regev proposed the first LWE public key cryptosystem at Tel Aviv University in Israel based on LWE distribution $$A_{s,\chi }$$. Because of this paper, Regev won the highest award for theoretical computer science in 2018—the Godel Award.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire   +1 more source

Cross‐Linking Mass Spectrometry of the Antimicrobial Peptides Magainin 2 and PGLa Reveals Heterodimerization in Micellar Medium

open access: yesRapid Communications in Mass Spectrometry, EarlyView.
ABSTRACT Rationale In this study, we applied cross‐linking mass spectrometry (XL‐MS) to characterize the oligomeric states of a PGLa/magainin 2 mixture and gain insight into the heterodimerization previously suggested in the literature. Both peptides have shown a synergistic enhancement of activity when tested in antimicrobial assays; however, the ...
Emilie Hirschler   +7 more
wiley   +1 more source

Towards an efficient LWE‐based fully homomorphic encryption scheme

open access: yesIET Information Security, 2022
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public‐key size.
Uddipana Dowerah   +1 more
doaj   +1 more source

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

open access: yes, 2018
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San   +3 more
core   +1 more source

Subspace LWE [PDF]

open access: yes, 2012
The (decisional) learning with errors problem (LWE) asks to distinguish "noisy" inner products of a secret vector with random vectors from uniform. The learning parities with noise problem (LPN) is the special case where the elements of the vectors are bits. In recent years, the LWE and LPN problems have found many applications in cryptography.
openaire   +1 more source

Urban Heat and Spatial Statistics, Toward Sustainable Cities and Society: A PRISMA‐Based Systematic Review and Empirical Assessment (2020–2025)

open access: yesSustainable Development, EarlyView.
ABSTRACT Over the past few decades, the intensification of global warming has brought increased attention to urban thermal dynamics, particularly regarding Land Surface Temperature (LST) and the Urban Surface Heat Island (SUHI) effect. This study conducts a systematic literature review alongside a bibliometric analysis of 123 peer‐reviewed articles ...
David Hidalgo‐García   +4 more
wiley   +1 more source

Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations [PDF]

open access: yes, 2018
Ideas from Fourier analysis have been used in cryptography for the last three decades. Akavia, Goldwasser and Safra unified some of these ideas to give a complete algorithm that finds significant Fourier coefficients of functions on any finite abelian ...
Galbraith, Steven D.   +2 more
core   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy